UDT Ranks on CRN’s 2020 Tech Elite 250 List

Share on facebook
Share on google
Share on twitter
Share on linkedin

UDT Ranks on CRN’s 2020 Tech Elite 25 List

UDT, a technology solutions company that evaluates, architects, secures and manages information technology, today announced that they have ranked on CRN’s 2020 Tech Elite List! This list acknowledges solution providers in the U.S. and Canada that have earned the largest number of advanced technical certifications from leading technology suppliers.

“We are proud to be recognized for our commitment to training and education, ” said Gerard Amaro, President of UDT. “We are so proud of our teams who work very hard to earn these certifications and expand their expertise.”

Amaro and CEO, Henry Fleches, founded UDT  25 years ago in South Florida and continue to grow their business within the areas of managed security and digital transformation services to their clients.

In the past, the CRN has named UDT to their Managed Service Provider 500 List and Solution Provider 500 List.

About UDT:

UDT is a technology enabler that helps clients in major industries evaluate, architect, secure, and manage technology on the go, in the rack and in the cloud. UDT provides customized services, including mobility, cloud, collaboration, loT, data, security, and ITaaS solutions and technical, professional and managed services.

Accomplish more with UDT: www.udtonline.com

About The Channel Company:

The Channel Company enables breakthrough channel performance with dominant media, engaging events, expert consulting and education and innovative marketing services and solutions. As the channel catalyst, they connect and empower technology suppliers, solution providers and end-users.


Editor’s note: Interviews are available upon request.


Focus time, money, and effort on what really matters

Let’s build success together. 

More to explore

SOC Solutions

The 9 Main Benefits of SOC Solutions

The Security and Operations Center (SOC) is where the cybersecurity strategy of a business is coordinated and implemented. It is composed of the three building blocks of people, processes and technology that go hand in hand to manage and enhance the organization’s security posture.

Multi-Factor Authentication

Seven Benefits of Multi-Factor Authentication

Hackers are using increasingly sophisticated tactics to gain data access. Email phishing, keylogging, brute force attacks and social engineering are among the variety of ways to gain access credentials.

Just one more step

Please fill out the following form,